MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d5bbcb4b0242124fd01644dfe1528bbb2107d795d8528b9fff8e53e62f165356. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 9


Intelligence 9 IOCs YARA 4 File information Comments

SHA256 hash: d5bbcb4b0242124fd01644dfe1528bbb2107d795d8528b9fff8e53e62f165356
SHA3-384 hash: 4e9771a4b40d66be6a6a4d1b1bca503c994cc52a0d075a6ee164f8da7350638e86b9a76a93d48f48fc0edd3e638e81f2
SHA1 hash: 3c99866c5310b423134d63b97614d6e4da597887
MD5 hash: 385b7c947497987fa63db336a4e27842
humanhash: whiskey-thirteen-wyoming-wisconsin
File name:385b7c947497987fa63db336a4e27842
Download: download sample
Signature TrickBot
File size:774'195 bytes
First seen:2021-06-23 01:25:51 UTC
Last seen:2021-06-23 01:38:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 53e4d13a217de8fcf024ca150e7234ba (9 x TrickBot)
ssdeep 12288:yqFVInSRf0r8caj0w4Zkd4MZo+YZFVRAfW:EnSRfm8mZkd4oodZPRh
Threatray 792 similar samples on MalwareBazaar
TLSH D6F4CF123AF1E476D1A615F04EF6EB24A3FAE9609F3249C737D14A4C79319C14A3B326
Reporter zbetcheckin
Tags:32 exe TrickBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
232
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
385b7c947497987fa63db336a4e27842
Verdict:
Malicious activity
Analysis date:
2021-06-23 01:28:14 UTC
Tags:
evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found malware configuration
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected Trickbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 438739 Sample: JuPj1hlcuh Startdate: 23/06/2021 Architecture: WINDOWS Score: 100 39 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->39 41 Found malware configuration 2->41 43 Multi AV Scanner detection for submitted file 2->43 45 Yara detected Trickbot 2->45 7 JuPj1hlcuh.exe 2->7         started        10 cmd.exe 1 2->10         started        process3 signatures4 47 Writes to foreign memory regions 7->47 49 Allocates memory in foreign processes 7->49 12 wermgr.exe 4 7->12         started        17 cmd.exe 7->17         started        19 cmd.exe 7->19         started        21 JuPj1hlcuh.exe 10->21         started        23 conhost.exe 10->23         started        process5 dnsIp6 33 202.166.196.111, 443 WLINK-NEPAL-AS-APWorldLinkCommunicationsPvtLtdNP Nepal 12->33 35 196.43.106.38, 443 UTANDEZW Zimbabwe 12->35 37 12 other IPs or domains 12->37 31 C:\Users\user\AppData\...\JuPj1hlcuh.exe, PE32 12->31 dropped 51 May check the online IP address of the machine 12->51 53 Tries to detect virtualization through RDTSC time measurements 12->53 55 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 12->55 57 Multi AV Scanner detection for dropped file 21->57 59 Writes to foreign memory regions 21->59 61 Allocates memory in foreign processes 21->61 25 wermgr.exe 21->25         started        27 cmd.exe 21->27         started        29 cmd.exe 21->29         started        file7 signatures8 process9
Threat name:
Win32.Trojan.Convagent
Status:
Malicious
First seen:
2021-06-23 01:26:12 UTC
AV detection:
3 of 46 (6.52%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:lib113 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Trickbot
Malware Config
C2 Extraction:
196.43.106.38:443
186.97.172.178:443
37.228.70.134:443
144.48.139.206:443
190.110.179.139:443
172.105.15.152:443
177.67.137.111:443
27.72.107.215:443
186.66.15.10:443
189.206.78.155:443
202.131.227.229:443
185.9.187.10:443
196.41.57.46:443
212.200.25.118:443
197.254.14.238:443
45.229.71.211:443
181.167.217.53:443
181.129.116.58:443
185.189.55.207:443
172.104.241.29:443
14.241.244.60:443
144.48.138.213:443
202.138.242.7:443
202.166.196.111:443
36.94.100.202:443
187.19.167.233:443
181.129.242.202:443
36.94.27.124:443
43.245.216.116:443
186.225.63.18:443
41.77.134.250:443
Unpacked files
SH256 hash:
dfc32e24f2270aa2af0cdbd8e094e047b49d88003e7d6a8d2b66faf7df84927e
MD5 hash:
c3dc3f449c002d07206e25d3342c9aa6
SHA1 hash:
79b378270cc561ad12b02e6a85435bdc3f281b62
Detections:
win_trickbot_a4 win_trickbot_auto
SH256 hash:
2203578a74aaf700f72f2ec7135eb1e86417c84613d0571ee0281eed7b739056
MD5 hash:
b2113c4e8343ad07775d62c4bbae5d95
SHA1 hash:
2f20dd66353aabaf7ab5528b59681e5e4f9e7eac
SH256 hash:
2db8ccd1992e6ebf98d9c99dcf5eaebeed7330a484d0d6f42846122455ba53f9
MD5 hash:
ef4e75c25dd820321c2601510d1af086
SHA1 hash:
b24d35e5117be467761f13d14eaa9f70c1579414
Detections:
win_trickbot_auto
SH256 hash:
d5bbcb4b0242124fd01644dfe1528bbb2107d795d8528b9fff8e53e62f165356
MD5 hash:
385b7c947497987fa63db336a4e27842
SHA1 hash:
3c99866c5310b423134d63b97614d6e4da597887
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Cobalt_functions
Author:@j0sm1
Description:Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:win_trickbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe d5bbcb4b0242124fd01644dfe1528bbb2107d795d8528b9fff8e53e62f165356

(this sample)

  
Delivery method
Distributed via web download

Comments